A Third-Party Risk Management Implementation Guide and Toolkit - Save your seat now To view this email as a web page,
click here | March 7th at 2pm ET / 11am PT | Attendees of this live webcast may be eligible for CPE credit. |
| |
| Third parties, whether they provide software or services to an organization, can introduce significant security risks, including ransomware, software vulnerabilities, loss of services, and breaches of confidential information. For this reason, companies have established third party risk management (TPRM) processes and dedicated staff to evaluating the security postures of existing and potential third parties. In this CISO Stories webinar, panelists share their experiences dealing with managing security risks in third party software and services. They will also discuss best practices and tools developed by a cross sector task force of CISOs, highlighting: | A six-phase third party risk management program lifecycle whose steps are critical to a successful third-party risk management program, including (supplier identification, classification, assessment, management, monitoring, and relationship termination) A TPRM Standard A TPRM Program Workbook (supplier inventory and automated security questionnaire) Strategies for addressing new supplier threats and regulations | | |
| | Can’t attend live? Sign up anyway and we’ll send you a link to the webcast recording when it becomes available. |
| |
| | SC Stories webcasts offer programs with leading IT security vendors moderated by CyberRisk Alliance editorial staff. Attendees may be eligible to receive 1 CPE credit for each one-hour webcast they attend, subject to their respective industry association’s approval. Unsubscribe here View Privacy Policy and Terms of Service You are subscribed as: [email protected] © 2024 CyberRisk Alliance | 400 Madison Avenue, Suite 6C New York, NY 10017 |
|
|
..